An Approach for Ensuring Security and its Verification
暂无分享,去创建一个
[1] Tadao Murata,et al. Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.
[2] Jiacun Wang,et al. Charging Information Collection Modeling and Analysis of GPRS Networks , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[3] Alessandro Giua,et al. Modeling and Supervisory Control of Railway Networks Using Petri Nets , 2008, IEEE Transactions on Automation Science and Engineering.
[4] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[5] Ranjan Dasgupta,et al. A Petri Net Representation of a Web-Service- Based Emergency Management System in Railway Station , 2011 .
[6] Lars Michael Kristensen,et al. Coloured Petri Nets and CPN Tools for modelling and validation of concurrent systems , 2007, International Journal on Software Tools for Technology Transfer.
[7] Asoke Nath,et al. Symmetric Key Cryptography Using Random Key Generator , 2010, Security and Management.